Dario Fiore
Orcid: 0000-0001-7274-6600Affiliations:
- IMDEA Software Institute, Madrid, Spain
- Max Planck Institute for Software Systems, Saarbrücken, Germany (former)
- New York University, Department of Computer Science, NY, USA
- École Normale Supérieure, Paris, France
- University of Catania, Italy (PhD 2010)
According to our database1,
Dario Fiore
authored at least 105 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
On the Power of Polynomial Preprocessing: Proving Computations in Sublinear Time, and More.
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Verification-efficient Homomorphic Signatures for Verifiable Computation over Data Streams.
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Computer Security - ESORICS 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Proceedings of the Applied Cryptography and Network Security, 2025
2024
Progressive and efficient verification for digital signatures: extensions and experimental results.
J. Cryptogr. Eng., September, 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Cuckoo Commitments: Registration-Based Encryption and Key-Value Map Commitments for Large Spaces.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Inner Product Functional Commitments with Constant-Size Public Parameters and Openings.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022
Proceedings of the PODC '22: ACM Symposium on Principles of Distributed Computing, Salerno, Italy, July 25, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
Proceedings of the Applied Cryptography and Network Security, 2022
2021
Theor. Comput. Sci., 2021
Controlled Functional Encryption Revisited: Multi-Authority Extensions and Efficient Schemes for Quadratic Functions.
Proc. Priv. Enhancing Technol., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Lunar: A Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Mon$\mathbb {Z}_{2^{k}}$a: Fast Maliciously Secure Two Party Computation on $\mathbb {Z}_{2^{k}}$.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
Improving the Efficiency of Re-randomizable and Replayable CCA Secure Public Key Encryption.
Proceedings of the Applied Cryptography and Network Security, 2020
2019
Monℤ<sub>2<sup>k</sup></sub>a: Fast Maliciously Secure Two Party Computation on ℤ<sub>2<sup>k</sup></sub>.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Structure-Preserving and Re-randomizable RCCA-Secure Public Key Encryption and Its Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
J. Cryptol., 2018
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions.
Des. Codes Cryptogr., 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the Applied Cryptography and Network Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Labeled Homomorphic Encryption - Scalable and Privacy-Preserving Processing of Outsourced Data.
Proceedings of the Computer Security - ESORICS 2017, 2017
Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Theor. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions.
J. Cryptol., 2014
Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results.
Int. J. Inf. Sec., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Relations between the security models for certificateless encryption and ID-based key agreement.
Int. J. Inf. Sec., 2012
Improved Publicly Verifiable Delegation of Large Polynomials and Matrix Computations.
IACR Cryptol. ePrint Arch., 2012
Uniqueness Is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Publicly verifiable delegation of large polynomials and matrix computations, with applications.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Concise Vector Commitments and their Applications to Zero-Knowledge Elementary Databases.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
Proceedings of the Multimedia and Security Workshop, 2010
Proceedings of the Topics in Cryptology, 2010
A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010
2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Proceedings of the Public Key Cryptography, 2008
Proceedings of the Advances in Cryptology, 2008